US 11,657,022 B2
Host and storage system for securely deleting files and operating method of the host
Jin-hwan Park, Yongin-si (KR); Chan-sol Kim, Hwaseong-si (KR); Myung-jin Jung, Yongin-si (KR); Ji-soo Kim, Gyeonggi-do (KR); Kyung-ho Kim, Seoul (KR); Pil-sung Kang, Hwaseong-si (KR); Bong-jun Choi, Hwaseong-si (KR); Chae-won Yu, Suwon-si (KR); and So-jeong Lee, Hwaseong-si (KR)
Assigned to SAMSUNG ELECTRONICS CO., LTD.
Filed by Samsung Electronics Co., Ltd., Suwon-si (KR)
Filed on Jul. 15, 2021, as Appl. No. 17/376,225.
Application 17/376,225 is a continuation of application No. 15/483,365, filed on Apr. 10, 2017, granted, now 11,106,630.
Claims priority of application No. 10-2016-0094830 (KR), filed on Jul. 26, 2016.
Prior Publication US 2021/0342302 A1, Nov. 4, 2021
Int. Cl. G06F 16/16 (2019.01); G06F 21/62 (2013.01); G06F 16/11 (2019.01)
CPC G06F 16/162 (2019.01) [G06F 16/122 (2019.01); G06F 21/6209 (2013.01); G06F 21/6218 (2013.01); G06F 2221/2143 (2013.01)] 19 Claims
OG exemplary drawing
 
17. An operating method of a controller, the operating method comprising:
receiving a first deletion request for a first file among a plurality of files from a host;
performing a first deletion operation on the first file in response to the first deletion request based on a secure deletion on the first file, the first deletion operation including invalidation of data of the first file and physical erasure of the invalid data of the first file;
receiving, after the first deletion operation is completed, a second deletion request for the first file from the host;
performing a second deletion operation on the first file in response to the second deletion request from the host based on the secure deletion on the first file, the second deletion operation is performed based on a control of an operating system (OS) of the host:
performing a third deletion operation on a second file based on a normal deletion on the second file, wherein the third deletion operation is performed based on the control of the OS of the host before erasure of invalid data of the second file is performed,
wherein the controller includes a history table storing information associated with invalid data of the plurality of files, and
wherein the physical erasure in response to the first deletion request is performed by referring to the history table.